10. Security Considerations
Overview
This section discusses security considerations for Kerberos implementations and deployments. Understanding these considerations is essential for secure operation.
Fundamental Security Properties
What Kerberos Provides
- Authentication of principals
- Protection against eavesdropping (with encryption)
- Protection against tampering (with integrity protection)
- Replay protection (with timestamps and nonces)
What Kerberos Does NOT Provide
- Protection against denial of service
- Protection if principals' keys are compromised
- Complete protection against password guessing
- Authorization (only authentication)
Cryptographic Considerations
Key Management
- Long-term keys must be kept secret
- Key derivation from passwords creates vulnerability
- Strong passwords essential
- Key compromise has broad impact
Algorithm Selection
- Use strong encryption algorithms
- Deprecate weak algorithms
- Follow current cryptographic best practices
- Plan for algorithm agility
Clock Synchronization
Requirements
- Clocks must be loosely synchronized
- Clock skew tolerance creates replay window
- Secure time synchronization essential
- NTP or similar must be secured
Network Considerations
DNS Security
- DNS responses may not be trustworthy
- DNSSEC recommended for KDC discovery
- Hostname canonicalization risks
- Service principal name validation critical
Address Restrictions
- IP addresses can be spoofed
- NAT complicates address-based restrictions
- Consider addressless tickets
- Don't rely solely on addresses for authorization
Cross-Realm Authentication
Trust Considerations
- Transited realm path must be verified
- Untrusted realms can compromise authentication
- Application servers should validate transited field
- Inter-realm keys establish trust relationships
Password-Based Authentication
Vulnerabilities
- Offline dictionary attacks possible
- Pre-authentication reduces but doesn't eliminate risk
- Strong password policies essential
- Consider additional authentication factors
Ticket Management
Credential Storage
- Long-lived tickets increase exposure
- Renewable tickets balance lifetime and security
- Secure credential cache essential
- Forward secrecy considerations
Ticket Forwarding
- Forwarded credentials grant broad access
- Only forward to trusted services
- OK-AS-DELEGATE flag provides guidance
- Limit credential forwarding
Implementation Security
Common Pitfalls
- Buffer overflows in message parsing
- Time-of-check to time-of-use issues
- Side-channel attacks on cryptography
- Random number generation weaknesses
Best Practices
- Validate all inputs
- Use constant-time comparisons
- Secure random number generation
- Regular security updates
Operational Security
Key Distribution
- Initial key establishment must be secure
- Out-of-band key distribution
- Password enrollment procedures
- Key rotation policies
Monitoring and Auditing
- Log authentication events
- Monitor for unusual activity
- Incident response procedures
- Compromise detection and response
Deployment Considerations
- Balance security and usability
- Defense in depth
- Regular security assessments
- Follow principle of least privilege
Reference
For comprehensive security discussion, refer to RFC 4120 Section 10.